A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography.
Fredy VargheseP. SasikalaPublished in: Wirel. Pers. Commun. (2023)
Keyphrases
- data transmission
- wireless sensor networks
- data acquisition
- information security
- computer networks
- energy consumption
- communication networks
- base station
- wireless channels
- data transfer
- data delivery
- security requirements
- multi hop
- error detection and correction
- routing protocol
- transmission delay
- key management
- high speed
- data hiding
- security protocols
- authentication scheme
- query processing
- network traffic
- low cost